Secure communication method for automotive ethernet based on dynamic key
FAN Jingjing1,2, LIU Zhuang1,2, CHEN Chao1,2, HUANG Chen3
1. School of Electrical and Control Engineering, North China University of Technology, Beijing 100144, China; 2. Jiangsu Industrial Innovation Center of Intelligent Equipment Co., Ltd., Changzhou, Jiangsu 213300, China; 3.School of Automotive and Traffic Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013, China
Abstract:For the security concerns of communication data and key in automotive ethernet, an automotive ethernet security communication method based on dynamic keys was innovatively designed. The attack tree model for automotive ethernet security threats was established to analyze the faced security threats. The comprehensive architecture for automotive ethernet security communication methods was constructed to address the threats, and the dynamic key algorithm model was designed to generate implicit dynamic keys. The secure communication method based on dynamic keys was designed to encrypt original data through dynamic keys, and the digests were generated and compared at the receiving end. Communication and network attack processes between domains were simulated using Linux-based systems, I.MX6ULL microcontrollers and Windows devices, and the difference degrees of keys, ciphertexts and plaintexts were compared. The communication process was attacked to analyze the data interactions by Wireshark software. The results show that the proposed method can effectively ensure the key security and the confidentiality, freshness, authenticity and integrity of automotive ethernet data, and it can effectively counter tampering attacks and replaying attacks.
NAVALE V M, WILLIAMS K, LAGOSPIRIS A, et al. (R)evolution of E/E architectures [J]. SAE Internatio-nal Journal of Passenger Cars-Electronic and Electrical Systems, 2015,8(2):282-288.
HU B Q, QIN G H, LIU Y, et al. Next generation automotive network:technology status and development of automotive ethernet in-vehicle network[J]. Computer Engineering and Applications, 2016, 52(24):29-36.(in Chinese)
[3]
SMIRNOV F. Design and evaluation of ethernet-based E/E-architectures for latency-and safety-critical appli-cations[D]. Erlangen, Germany: Friedrich-Alexander-Universitt Erlangen-Nürnberg, 2019.
[4]
HU Q, LUO F. Review of secure communication approaches for in-vehicle network [J]. International Journal of Automotive Technology, 2018,19(5):879-894.
WU J X. Endogenous security problems and countermeasures of intelligent connected vehicle [J]. Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2023,35(3):383-390. (in Chinese)
[6]
JEONG S, JEON B, CHUNG B, et al. Convolutional neural network-based intrusion detection system for AVTP streams in automotive ethernet-based networks [J]. Vehicular Communications, DOI:10.1016/j.vehcom.2021.100338.
[7]
JO W, KIM S J, KIM H, et al. Automatic whitelist ge-neration system for ethernet based in-vehicle network [J]. Computers in Industry,DOI:10.1016/j.compind.2022.103735.
[8]
SALEM M, MOHAMMED M, RODAN A. Security approach for in-vehicle networking using blockchain technology [J]. Lecture Notes on Data Engineering and Communications Technologies, 2019,29: 504-515.
[9]
LI J M, FU S, WU Y J, et al. High-efficiency encryption and authentication network security for automotive ethernet [J]. International Journal of Modeling and Optimization,2022,12(2):36-42.
[10]
WANG C T, QIN G H, ZHAO R, et al. An information security protocol for automotive ethernet [J]. Journal of Computers, 2021, 32(1): 39-52.
LI T, LI B, CHANG C, et al. Attack tree-based mode-ling of LoRaWAN security threat[J]. Communications Technology, 2018, 51(11):2695-2701.(in Chinese)
[12]
LALLIE H S, DEBATTISTA K, BAL J. A review of attack graph and attack tree visual syntax in cyber security[J]. Computer Science Review, DOI: 10.1016/j.cos-rev.2019.100219.